SAP HANA is an in-memory database for real-time processing and querying high volumes of data. HANA’s in-memory computing database infrastructure eliminates the need to load or write data back. It is a popular database that often stores sensitive corporate information that requires protection and compliance controls. Securing HANA is a critical part of a SAP security strategy.
SAP HANA offers security features, such as authentication and single sign-on (SSO), authorization and role management, encryption, data privacy, and auditing. We’ll review these features and provide essential best practices that can help you secure your HANA deployment.
SAP HANA database supports several authentication mechanisms, including SAML bearer tokens, username/password, Kerberos, and JSON Web tokens. A per-database configuration is not always possible—it depends on the user client and authentication mechanism. Here is how it works:
Related content: Read our guide to SAP Access
SAP HANA and SAP HANA Cloud offer a comprehensive authorization framework for highly granular access control. It allows users to access an SAP HANA database only through defined client interfaces and perform operations on database objects according to their allocated privileges and roles.
Roles help bundle and structure privileges for specific user functions or tasks, and privileges are based on standard SQL object privileges. SAP HANA-specific extensions are used for the privileges of business applications.
SAP HANA offers various encryption capabilities for each deployment type. Here are key options:
Both deployment types can integrate with SAP Data Custodian KMS for full control over encryption keys.
Here are key SAP HANA data privacy mechanisms:
Auditing can help you monitor and record actions performed in SAP HANA databases, SAP HANA Cloud, and SAP HANA Platform. You can leverage audits to improve the security of your database, for example, by detecting security vulnerabilities. It can help you learn whether certain users have too many privileges, uncover security breach attempts, and protect against security violations and data misuse.
SAP HANA provides configurable and policy-based audit logging for critical system events, such as changes to the database configuration. It can record access to sensitive data, such as executed procedures, or write and read access to objects like views and tables. SAP HANA also offers firefighter logging—when enabled, this feature offers temporary, highly privileged access to critical systems.
Related content: Read our guide to SAP Audits
SAP HANA allows you to define role-based permissions using privilege groups. You can create privilege groups at the system, object, analytics, package, and application level. Role-based configuration of privileges helps limit the damage that can be caused by internal threats or external attackers who compromise SAP HANA user accounts. When setting up permissions and groups, use the least privilege principle to limit roles to the minimum level of control required for each user.
SAP provides regular system updates to patch vulnerabilities and fix security issues. To keep SAP HANA secure, patches must be updated as soon as they are released. Be sure to check the latest SAP Security Notes, released on the second Tuesday of every month. This note provides security information about known vulnerabilities and how to prevent exploits.
Vendor-installed systems help simplify the deployment and configuration of SAP HANA. If you are deploying SAP HANA on a self-managed system, take these steps to secure your deployment:
Managing security across multiple SAP instances can be a challenging, time-consuming, and manual process. Without proper security protection in place, companies expose themselves to threats that may lead to system outages, data loss, or financial fraud.
With Pathlock, organizations using SAP can automate many of their SAP security processes to provide 360-degree protection across the SAP system landscape. The Pathlock platform can provide proactive protection, including:
Interested to find out how Pathlock can help to automate your SAP Security program while keeping your landscape secure and compliant? Request a demo of Pathlock today!
Share